VPN Network Service - Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
#nebula #tailscale #mesh #vpn #golang #go #overlay #meshvpn

0xdcarns e1ab6b21fd added static server routes 3 anni fa
.github 78634d20c2 changed go from 1.17 to 1.18 3 anni fa
auth 1e77a9eca4 remove new line to fix warning: fmt.Fprintln arg list ends with redundant newline 3 anni fa
compose dbb2446c41 compose update 2 3 anni fa
config 747d6bc692 remove comms network leftovers 3 anni fa
controllers c2286b3a4b dns fix 3 anni fa
database 5e327fdea4 set max open conns to 1 for sqlite 3 anni fa
docker 0bebda718e Merge pull request #1027 from gravitl/feature_v0.13.0_grpc 3 anni fa
functions 2b1f20e94b changes from code review 3 anni fa
img 643093c133 adding image folder 3 anni fa
kube 7152f6ccd4 remove references to grpc/comms net 3 anni fa
logger e1b590d43f another attempt at fixing logging 3 anni fa
logic e1ab6b21fd added static server routes 3 anni fa
models 68b52279ae added peers to pull/join responses 3 anni fa
mq a6ee8101e6 small refactors 3 anni fa
netclient 55dd7c18f7 added address struct 3 anni fa
nginx 7152f6ccd4 remove references to grpc/comms net 3 anni fa
scripts 7152f6ccd4 remove references to grpc/comms net 3 anni fa
servercfg 747d6bc692 remove comms network leftovers 3 anni fa
serverctl 6eab0498fc some changes around iptables 3 anni fa
test 7152f6ccd4 remove references to grpc/comms net 3 anni fa
tls 8f8272aad7 certificate cleanup 3 anni fa
validation 8f72ecbaa0 refactored logic 3 anni fa
.dockerignore 974627a9ab reorg of dockerfiles 3 anni fa
.fpm ab3e643d5e add rpms 3 anni fa
.gitignore 3e8a0554c2 changed dir name and added to gitignore, removed log 3 anni fa
CONTRIBUTING.md 95659ef0a5 Create CONTRIBUTING.md 3 anni fa
Dockerfile 3a3cd83e85 speedup docker builds 3 anni fa
LICENSE.txt 375482c16d updating docs 4 anni fa
README.md c237430629 readme update 3 anni fa
SECURITY.md d53bfd6ab1 Update SECURITY.md 3 anni fa
dev.yaml 747d6bc692 remove comms network leftovers 3 anni fa
go.mod 42889edd5b Bump github.com/urfave/cli/v2 from 2.4.0 to 2.4.8 3 anni fa
go.sum 42889edd5b Bump github.com/urfave/cli/v2 from 2.4.0 to 2.4.8 3 anni fa
main.go a15fd750d1 change order 3 anni fa
netmaker.exe 894fd1f5bd making dual stack addressing work client side 3 anni fa

README.md

a platform for modern, blazing fast virtual networks

WireGuard® Automation from Homelab to Enterprise

  • Peer-to-Peer Mesh Networks
  • Kubernetes and Multi-Cloud Enablement
  • Remote Site Access via Gateway
  • OAuth and Private DNS Features
  • Fine-grained access controls
  • Support for Linux, Mac, Windows, FreeBSD, iPhone, and Android

Get Started in 5 Minutes

For DigitalOcean, use the 1-Click App:
For production-grade installations, visit the Install Docs.
For an HA install using helm on k8s, visit the Helm Repo.

  1. Get a cloud VM with Ubuntu 20.04 and a public IP.
  2. Open ports 443, 80, 53, and 51821-51830/udp on the VM firewall and in cloud security settings.
  3. Run the script (see below for optional configurations):

wget -qO - https://raw.githubusercontent.com/gravitl/netmaker/master/scripts/nm-quick.sh | sudo bash

Upon completion, the logs will display the instructions to connect various devices. These can also be retrieved from the UI under "Access Keys."

After installing Netmaker, check out the Walkthrough and Getting Started guides to learn more about configuring networks. Or, check out some of our other Tutorials for different use cases, including Kubernetes.

Optional configurations

Deploy a "Hub-And-Spoke VPN" on the server
This will configure a standard VPN (non-meshed) for private internet access, with 10 clients (-c).
wget -qO - https://raw.githubusercontent.com/gravitl/netmaker/master/scripts/nm-quick.sh | sudo bash -s -- -v true -c 10

Specify Domain and Email
Make sure your wildcard domain is pointing towards the server ip.
wget -qO - https://raw.githubusercontent.com/gravitl/netmaker/master/scripts/nm-quick.sh | sudo bash -s -- -d mynetmaker.domain.com -e [email protected]

Script Options

./nm-quick
-d domain.example.com # specify a wildcard domain for netmaker to use (DNS must point to this server)
-e [email protected] # specify your email (for SSL certificates)
-m true # create a default 'mesh network' (on by default)
-v false # create a default 'VPN network' (off by default)
-c 7 # number of client configs to create (for VPN network, 5 by default)

Why Netmaker + WireGuard?

  • Netmaker automates virtual networks between data centers, clouds, and edge devices, so you don't have to.

  • Kernel WireGuard offers maximum speed, performance, and security.

  • Netmaker is built to scale from the small business to the enterprise.

  • Netmaker with WireGuard can be highly customized for peer-to-peer, site-to-site, Kubernetes, and more.

Get Support

Community Projects

Disclaimer

WireGuard is a registered trademark of Jason A. Donenfeld.

License

Netmaker's source code and all artifacts in this repository are freely available. All versions are published under the Server Side Public License (SSPL), version 1, which can be found here: LICENSE.txt.